Page 1137 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1137

grave, from the time it’s created to the time it’s destroyed. The
               following list includes some terms used to identify different phases of

               data within its lifecycle:

               Creation or Capture Data can be created by users, such as when a
               user creates a file. Systems can create it, such as monitoring systems
               that create log entries. It can also be captured, such as when a user
               downloads a file from the internet and traffic passes through a border
               firewall.

               Classification It’s important to ensure that data is classified as soon
               as possible. Organizations classify data differently, but the most

               important consideration is to ensure that sensitive data is identified
               and handled appropriately based on its classification. Chapter 5
               discusses different methods used to define sensitive data and define
               data classifications. Once the data is classified, personnel can ensure
               that it is marked and handled appropriately, based on the

               classification. Marking (or labeling) data ensures that personnel can
               easily recognize the data’s value. Personnel should mark the data as
               soon as possible after creating it. As an example, a backup of top secret
               data should be marked top secret. Similarly, if a system processes
               sensitive data, the system should be marked with the appropriate
               label. In addition to marking systems externally, organizations often
               configure wallpaper and screen savers to clearly show the level of data

               processed on the system. For example, if a system processes secret
               data, it would have wallpaper and screen savers clearly indicating it
               processes secret data.

               Storage Data is primarily stored on disk drives, and personnel
               periodically back up valuable data. When storing data, it’s important
               to ensure that it’s protected by adequate security controls based on its
               classification. This includes applying appropriate permissions to

               prevent unauthorized disclosure. Sensitive data should also be
               encrypted to protect it. Backups of sensitive information are stored in
               one location on-site, and a copy is stored at another location off-site.
               Physical security methods protect these backups against theft.
               Environmental controls protect the data against loss due to
               environmental corruption such as heat and humidity.
   1132   1133   1134   1135   1136   1137   1138   1139   1140   1141   1142